💻
Hacking
Anything that can be used for good can be used for evil ⚡
Lists (32)
Sort Name ascending (A-Z)
Active Directory
11 repositories
AI Agents
29 repositories
AI and LLM
1 repository
AI Security
23 repositories
AI Social Engineering
1 repository
AI Tools
2 repositories
AV/EDR Bypass
2 repositories
Challenges
2 repositories
Cloud Pentest
GCP, AWS, AZURE2 repositories
CTI
3 repositories
CVE-POC
1 repository
DevOps
Open source devops tool alternative21 repositories
DevSecOps + Cloud Security
23 repositories
Email Solutions
2 repositories
General
4 repositories
gRPC
1 repository
Incident Response
2 repositories
IOT Hacking
1 repository
Labs
2 repositories
Learning Resources
2 repositories
MCPs
1 repository
MSC
26 repositories
Pentest Projects
7 repositories
Post-Exploitation Tools
2 repositories
Programming
2 repositories
Python
1 repository
RATs and C2
6 repositories
Red Teaming Projects
6 repositories
SAST
1 repository
Secure Chatting
1 repository
Telecom
1 repository
Web Security
39 repositories
Stars
- All languages
- Assembly
- Astro
- AutoIt
- Batchfile
- C
- C#
- C++
- CSS
- Clojure
- Crystal
- Dockerfile
- Go
- Groovy
- HCL
- HTML
- Hack
- Java
- JavaScript
- Jinja
- Jupyter Notebook
- Just
- Kotlin
- Lua
- MDX
- Makefile
- Markdown
- Nim
- OCaml
- PHP
- Pascal
- Perl
- PowerShell
- Python
- Ruby
- Rust
- SCSS
- Shell
- Solidity
- Swift
- TypeScript
- Vim Script
- Vue
- YARA
- Zig
1
star
written in Batchfile
Clear filter
Windows / Linux Local Privilege Escalation Workshop